<--- Back to Details
First PageDocument Content
CWC mode / OCB mode / Block cipher / Feistel cipher / Advantage / Cipher / Cryptographic hash function / Advanced Encryption Standard / EAX mode / Cryptography / Block cipher modes of operation / Authenticated encryption
Date: 2012-12-05 15:13:00
CWC mode
OCB mode
Block cipher
Feistel cipher
Advantage
Cipher
Cryptographic hash function
Advanced Encryption Standard
EAX mode
Cryptography
Block cipher modes of operation
Authenticated encryption

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 907,10 KB

Share Document on Facebook

Similar Documents

A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of Ope

DocID: 1s3Vm - View Document

Hardware security module / Security / Cryptographic nonce / Block cipher / EAX mode / Cryptography / Block cipher modes of operation / One-time password

YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubico

DocID: 17Z30 - View Document

Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

DocID: 13aK2 - View Document

Ciphertext / Symmetric-key algorithm / Cipher / EAX mode / Disk encryption theory / Cryptography / Block cipher modes of operation / Block cipher

Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption

DocID: Rn7V - View Document

Known-plaintext attack / EAX mode / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,

DocID: MjcH - View Document